Traffic Morphing: An Efficient Defense Against Statistical Traffic Analysis


Recent work has shown that properties of network traffic that remain observable after encryption, namely packet sizes and timing, can reveal surprising information about the traffic’s contents (e.g., the language of a VoIP call [29], passwords in secure shell logins [20], or even web browsing habits [21, 14]). While there are some legitimate uses for… (More)


10 Figures and Tables


Citations per Year

225 Citations

Semantic Scholar estimates that this publication has 225 citations based on the available data.

See our FAQ for additional information.

Slides referencing similar topics